Countering cross-technology jamming attack

Internet-of-things (IoT) devices are sharing the radio frequency band (e.g., 2.4 GHz ISM band). The exponentially increasing number of IoT devices introduces potential security issues at the gateway in IoT networks. In this paper, we introduce a set of new attacks through concealed jamming - an adversary pretends to be (or compromises) a legitimate WiFi device, then sends out WiFi packets to prevent ZigBee devices' communication or collide with ZigBee's packets. By doing this, concealed jamming has the potential to severely delay the reception of ZigBee packets that may contain important information (e.g., critical health data from wearables, fire alarms, and intrusion alarms). To defend against these attacks, we designed a novel ZigBee data extraction technique that can recover ZigBee data from the ZigBee packets that were collided with WiFi packets. We extensively evaluated our design in different real-world settings. The results show that ZigBee devices (protected by our proposed methods) achieve similar performance as those that are not under the concealed jamming attack. Moreover, compared with unprotected devices, their throughput is more than 15 times higher than the unprotected one that is under concealed jamming attacks.

[1]  Par sandy M. Thomas Quel sens ont nos séquences ? Les brevets en surrégime , 1999 .

[2]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[3]  Ming Yu,et al.  NIS02-4: A Secure Quality of Service Routing Protocol for Wireless Ad Hoc Networks , 2006, IEEE Globecom 2006.

[4]  Ting Zhu,et al.  A Dynamic Secure QoS Routing Protocol for Wireless Ad Hoc Networks , 2006, 2006 IEEE Sarnoff Symposium.

[5]  P. Frehill,et al.  Using Zigbee to Integrate Medical Devices , 2007, 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[6]  David Wetherall,et al.  Taking the sting out of carrier sense: interference cancellation for wireless LANs , 2008, MobiCom '08.

[7]  Dina Katabi,et al.  Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.

[8]  Philip Levis,et al.  The β-factor: measuring wireless link burstiness , 2008, SenSys '08.

[9]  Ivan Martinovic,et al.  Jamming for good: a fresh approach to authentic communication in WSNs , 2009, WiSec '09.

[10]  Radha Poovendran,et al.  A Game-Theoretic Framework for Jamming Attacks and Mitigation in Commercial Aircraft Wireless Networks , 2009 .

[11]  Wei Wang,et al.  SAM: enabling practical spatial multiple access in wireless LAN , 2009, MobiCom '09.

[12]  Andreas Terzis,et al.  RACNet: a high-fidelity data center sensing network , 2009, SenSys '09.

[13]  Srdjan Capkun,et al.  Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.

[14]  Vlado Handziski,et al.  Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks , 2009, EWSN.

[15]  Srdjan Capkun,et al.  Detection of reactive jamming in sensor networks , 2010, TOSN.

[16]  Ranjit Singh,et al.  Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.

[17]  Quanyan Zhu,et al.  A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.

[18]  Manos M. Tentzeris,et al.  A novel Zigbee-based low-cost, low-power wireless EKG system , 2010, 2010 IEEE MTT-S International Microwave Symposium.

[19]  Andreas Terzis,et al.  Surviving wi-fi interference in low power ZigBee networks , 2010, SenSys '10.

[20]  Donald F. Towsley,et al.  A secure energy routing mechanism for sharing renewable energy in smart microgrid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[21]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[22]  Lei Tang,et al.  EM-MAC: a dynamic multichannel energy-efficient MAC protocol for wireless sensor networks , 2011, MobiHoc '11.

[23]  Srdjan Capkun,et al.  Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.

[24]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[25]  Yue Wu,et al.  Cross-layer Detection for Black Hole Attack in Wireless Network ? , 2012 .

[26]  Alon Efrat,et al.  Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.

[27]  Yue Wu,et al.  An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks , 2013, Ad Hoc Sens. Wirel. Networks.

[28]  Peng Ning,et al.  Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time , 2013, 2013 IEEE Symposium on Security and Privacy.

[29]  Triet Vo Huu,et al.  Counter-jamming using mixed mechanical and software interference cancellation , 2013, WiSec '13.

[30]  Jianhua Li,et al.  A denial of service attack in advanced metering infrastructure network , 2014, 2014 IEEE International Conference on Communications (ICC).

[31]  Donald F. Towsley,et al.  Reliability analysis for cryptographic key management , 2014, 2014 IEEE International Conference on Communications (ICC).

[32]  Ruhr-University Bochum,et al.  Zero-Communication Seed Establishment for Anti-Jamming Techniques , 2014 .

[33]  Ming Li,et al.  MIMO-based jamming resilient communication in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[34]  Ilenia Tinnirello,et al.  Learning from errors: Detecting ZigBee interference in WiFi networks , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[35]  Ting Zhu,et al.  A Survey on Spectrum Utilization in Wireless Sensor Networks , 2015, J. Sensors.

[36]  Shu Li,et al.  Zigbee transmission system for wearable ECG device based on compressed sensing , 2015 .

[37]  Ting Zhu,et al.  B2W2: N-Way Concurrent Communication for IoT Devices , 2016, SenSys.

[38]  Ting Zhu,et al.  Shepherd: sharing energy for privacy preserving in hybrid AC-DC microgrids , 2016, e-Energy.

[39]  Ting Zhu,et al.  Gait-Based Wi-Fi Signatures for Privacy-Preserving , 2016, AsiaCCS.

[40]  Peng Ning,et al.  Wireless Communications under Broadband Reactive Jamming Attacks , 2016, IEEE Transactions on Dependable and Secure Computing.

[41]  Marwan Krunz,et al.  Jamming attack on in-band full-duplex communications: Detection and countermeasures , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[42]  Saewoong Bahk,et al.  Dodge-Jam: Anti-Jamming Technique for Low-Power and Lossy Wireless Networks , 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[43]  Bin Liu,et al.  Performance analysis for ZigBee under WiFi interference in smart home , 2017, 2017 IEEE International Conference on Communications (ICC).

[44]  Ting Zhu,et al.  EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[45]  Ting Zhu,et al.  PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).

[46]  Xin Liu,et al.  Chiron: Concurrent High Throughput Communication for IoT Devices , 2018, MobiSys.

[47]  Chiron , 2018, Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services.

[48]  Wei Wang,et al.  GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation , 2018, 2018 IEEE International Conference on Communications (ICC).

[49]  Ting Zhu,et al.  An Unmanned Aerial Vehicle Navigation Mechanism with Preserving Privacy , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[50]  Ting Zhu,et al.  Parallel inclusive communication for connecting heterogeneous IoT devices at the edge , 2019, SenSys.

[51]  Yan Li,et al.  Simultaneous Bi-directional Communications and Data Forwarding using a Single ZigBee Data Stream , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.